An emerging malicious software, known as GodLoader, has sparked concerns within the cybersecurity community due to its capability to covertly infiltrate devices running on various operating systems, such as Windows, macOS, Linux, Android, and iOS.

Unveiled by Check Point Research, this sophisticated malware takes advantage of the Godot Engine, a widely-used open-source platform for game development, to execute harmful scripts without being easily detected by most antivirus software.

GodLoader utilizes GDScript, the scripting language of the Godot Engine, to distribute and run malicious payloads. GDScript, a language similar to Python, is specifically designed for game development, allowing developers to generate dynamic content. Unfortunately, cybercriminals have exploited this flexibility to create scripts that trigger malicious actions.

The distribution of this malware occurs through the Stargazers Ghost Network, an advanced “Malware-as-a-Service” operation hosted on GitHub. During September and October 2024, more than 200 repositories and 225 accounts were utilized to disseminate GodLoader.

These repositories posed as legitimate projects, leveraging GitHub’s “starring” feature to deceive unsuspecting users.

After being downloaded, GodLoader executes its payload by either embedding or dynamically loading malicious .pck files (utilized by Godot for bundling game assets), as stated by Checkpoint researchers informed.

These files consist of encrypted GDScripts that are decrypted and executed by the engine. The malware also employs sophisticated evasion techniques, such as anti-sandboxing and anti-virtual machine checks, to evade detection.

GodLoader Cross-Platform Potentials

One of the most alarming aspects of GodLoader is its cross-platform adaptability. The Godot Engine enables developers to export projects to various platforms with minimal adjustments. Malicious actors have exploited this feature to target:

  • Windows: Initial samples indicated successful payload delivery on Windows systems.
  • macOS and Linux: POC attacks revealed that similar techniques could be adapted with minor modifications.
  • Android: Although still in developmental stages, researchers assert that an Android edition is achievable.
  • iOS: Implementing on iOS faces hurdles due to Apple’s strict App Store regulations but remains a plausible threat.

This versatility renders GodLoader a potent tool for malicious actors seeking to widen their impact across diverse operating systems.

The Stargazers Ghost Network played a pivotal role in disseminating GodLoader. Between June and October 2024, the network initiated multiple campaigns using GitHub repositories to host malicious data. These repositories were consistently updated via automated bots to seem legitimate and entice unaware users.

Godloader Timeline

The malware’s infection process initiates with the download of an apparently harmless archive containing executable data and .pck resources. Upon execution, the malware decrypts the .pck file, executes malicious GDScripts, and downloads extra payloads from remote servers. Particularly, these payloads encompassed cryptocurrency miners such as XMRig and data-stealing malware like RedLine.

GodLoader poses a significant hazard owing to its capacity to exploit legitimate tools like the Godot Engine. With the potential risk to over 1.2 million users of games developed on Godot, attackers could target gamers by substituting genuine .pck files with infected ones or disseminating corrupted game modifications.

Additionally, the malware’s ability to go unnoticed by most antivirus software enhances its threat. For instance, Check Point researchers discovered that several infected archives had been downloaded more than 17,000 times without triggering any security warnings.

Remedial Tactics

To safeguard against threats like GodLoader:

  • Consistently update operating systems and applications.
  • Refrain from downloading software from untrusted sources.
  • Deploy robust endpoint security solutions capable of identifying advanced threats.
  • Educate employees and users about phishing techniques and suspicious downloads.
  • Developers utilizing the Godot Engine should secure .pck files with asymmetric encryption methods to deter tampering.

GodLoader symbolizes a fresh realm in cross-platform malware evolution, capitalizing on the trust in open-source tools like the Godot Engine. Its discreet distribution strategies and advanced evasion methods underscore the escalating sophistication of cyber threats.

As attackers persist in innovation, attentiveness and proactive security measures are vital to counteract the risks posed by such multi-platform malware.

Signs of Intrusion

Description Value
Archive distributed by Stargazers Ghost Network 260f06f0c6c1544afcdd9a380a114489ebdd041b846b68703158e207b7c983d6
Launcherkks.exe 3317b8e19e19218e5a7c77a47a76f36e37319f383b314b30179b837e46c87c45
Launcherkks.pck 0d03c7c6335e06c45dd810fba6c52cdb9eafe02111da897696b83811bff0be92
RedLine 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2
6be9c015c82645a448831d9dc8fcae4360228f76dff000953a76e3bf203d3ec8
XMRig b1a351ee61443b8558934dca6b2fa9efb0a6d2d18bae61ace5a761596604dbfa
RedLine C&Cs 147.45.44.83:6483
185.196.9.26:6302

The post New Stealthy GodLoader Malware Attacking Windows, macOS, Linux, Android, & iOS Devices appeared first on Cyber Security News.